Abstract:Typical reversible data hiding in encrypted image (RDH-EI) methods merely embed data in the encrypted domain, ignoring the requirement of the image owner for data embedding. To address this issue, this paper proposes a novel RDH-EI method with dual data embedding based on generalized integer transformation (GIT). The image owner first vacates embedding room, and performs data embedding before image encryption. After data encryption, the remote server utilizes the vacated room to further embed additional data i… Show more
“…Selfembedding refers to embedding a portion of data into its data during the preprocessing stage before encryption rather than during the data embedding stage. To reserve space, data self-embedding was performed on a cover image during the preprocessing step of work [27]. Before image encryption, error correction data were generated through preprocessing and reversibly embedded into the down-sampling pixels of the original cover image.…”
Section: Data Self-embeddingmentioning
confidence: 99%
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
High security and effectiveness are critical performance metrics in the data transmission process for satellite remote sensing images, medical images, and so on. Previously, the receiver could gain a high-quality cover image (lossy) after decryption in a separable manner to balance embedding capacity (EC) and security. Completely separable, reversible data hiding in encrypted image (SRDH-EI) algorithms are proposed to address this issue. In this study, the cover image was preprocessed at the sender’s end. The pre-embedded pixels and most significant bits (MSB) were compressed via two coding methods to reserve space. Additionally, the header data were embedded for marking. Finally, auxiliary data and secret data were embedded in a forward “Z” and reverse “Z” shape before and after encryption, respectively. The receiver could extract secret data and decrypt the cover image separately using the keys and markers. The experimental results demonstrate that the algorithm reached a high EC for remote sensing images by utilizing pixel correlation at multiple positions within the groups. The cover image could maintain its entropy during the data embedding process, ensuring security. The decrypted image could be recovered without distortion, furthermore, the receiver could achieve complete separability, so it has good application prospects for remote sensing images.
“…Selfembedding refers to embedding a portion of data into its data during the preprocessing stage before encryption rather than during the data embedding stage. To reserve space, data self-embedding was performed on a cover image during the preprocessing step of work [27]. Before image encryption, error correction data were generated through preprocessing and reversibly embedded into the down-sampling pixels of the original cover image.…”
Section: Data Self-embeddingmentioning
confidence: 99%
“…The joint algorithms must perform data extraction and cover decryption according to the designed order. To achieve true reversibility and separability, the two operations must be completed without errors, such as in [7][8][9][10][11][12][13][14]27,36], etc. Separable algorithms have more flexibility.…”
High security and effectiveness are critical performance metrics in the data transmission process for satellite remote sensing images, medical images, and so on. Previously, the receiver could gain a high-quality cover image (lossy) after decryption in a separable manner to balance embedding capacity (EC) and security. Completely separable, reversible data hiding in encrypted image (SRDH-EI) algorithms are proposed to address this issue. In this study, the cover image was preprocessed at the sender’s end. The pre-embedded pixels and most significant bits (MSB) were compressed via two coding methods to reserve space. Additionally, the header data were embedded for marking. Finally, auxiliary data and secret data were embedded in a forward “Z” and reverse “Z” shape before and after encryption, respectively. The receiver could extract secret data and decrypt the cover image separately using the keys and markers. The experimental results demonstrate that the algorithm reached a high EC for remote sensing images by utilizing pixel correlation at multiple positions within the groups. The cover image could maintain its entropy during the data embedding process, ensuring security. The decrypted image could be recovered without distortion, furthermore, the receiver could achieve complete separability, so it has good application prospects for remote sensing images.
“…RDH-ED methods can be broken down into two main categories: Reserving Room Before Encryption (RRBE) [1][2][3][4], and Vacating Room After Encryption (VRAE) [5][6][7]. In RRBE methods, the content owner liberates space for the data in the media in a preprocessing step.…”
Today, 3D objects are an increasingly popular form of media. It has become necessary to secure them during their transmission or archiving. In this paper, we propose a two tier reversible data hiding method for 3D objects in the encrypted domain. Based on the homomorphic properties of the Paillier cryptosystem, our proposed method embeds a first tier message in the encrypted domain which can be extracted in either the encrypted domain or the clear domain. Indeed, our method produces a marked 3D object which is visually very similar to the original object. It seeks to be format compliant and to preserve the original size of the data, without the need for an auxiliary file. Moreover, large keys are used, rending our method secure for real life applications.
“…However, most of the reversible data hiding schemes have extremely low embedding capability. In this case, a lot of reversible data hiding algorithms [22][23][24][25][26][27][28][29][30][31][32][33] were proposed for encrypted images to increase the embedding capability; meanwhile, keeps high fidelity. However, embedding secret data in a meaningless image deviate from the essence of steganography.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.